Cryptocurrency is making it easier for hackers to get paid while protecting their anonymity. Malicious cryptomining is on the rise - moving more mainstream, and as a result, more profitable than ever. And the market volatility of cryptocurrency makes this emerging threat more financially lucrative than ransomware.

Are you at risk? With a 19x increase in crypto related traffic in the last nine months, there’s never been a better time to find out if computing resources in your organization are being used without your knowledge.

Watch this webcast to see which industries and geographies are most at risk!

With more unmanaged devices connecting to the network and more users working from anywhere, security gaps are widening.
Defending mobile devices, cloud data and user behavior is harder than ever. You need deep visibility to expose not only what files and users are doing on their devices, but where they try to connect to the internet so you can stop malicious behavior immediately.
Watch to find out how you can strengthen your security posture and protect your users and devices, everywhere they access the internet.

With highly distributed environments becoming the norm, SaaS usage on the rise and roaming users an attractive target for threats, find out how to shift your security, gain control and protect users more effectively.

Enterprise Strategy Group partnered with Cisco to validate trends in the market, customer perceptions and technology consumption patterns. Research reveals a shift in the market leading to a fundamentally new approach to how organizations secure roaming users and branch office (ROBO) locations.

Join ESG Security Analyst, Jon Oltsik, and Cisco Product expert, Negisa Taymourian, for a unique perspective on the state of cybersecurity today.

Today, students and staff have the freedom to teach and learn, anywhere. Cloud applications enable students and staff to improve productivity, simplify collaboration and reduce on-premises IT costs. But these changes can introduce a new set of security challenges.

How do you protect students are accessing objectionable content, secure their records and block malware from infecting machines — like Chromebook devices?

The answer is better visibility. You need to see and protect internet access across students and staff, everywhere they learn, even off-campus.
Join us on Tuesday, May 14, 2019 at 11 a.m. PT / 2 p.m. ET to learn three simple ways to secure your school district, and save time.

Do you know all of the cloud apps and services in use in your organization...and their risk level. It's time for better visibility into sanctioned and unsanctioned cloud services across your enterprise. Now more than ever you need to be able to see what's happening at every level of your organization - and block risky or inappropriate cloud apps easily.

Join us on Thursday, May 2, 2019 at 11 a.m. PT / 2 p.m. ET to learn how you can gain visibility into cloud apps, quickly identify trends and turn possible risks into insight to better secure your users and data.

Cisco Umbrella is a cloud security platform that leverages DNS to provide the first line of defense against threats on the internet wherever users go. Because it’s built into the foundation of the internet, Umbrella delivers complete visibility into internet activity across all locations, devices, and users, and blocks threats before they reach your network or endpoints. By analyzing and learning from internet activity patterns, Umbrella automatically uncovers attacker infrastructure staged for current and emerging threats. And because it’s delivered from the cloud, Umbrella provides effective security that is simple to deploy and easy to use.

According to the 2018 Enterprise Network Management Megatrends report, 91 percent of network operations teams have established formal collaboration with the security team.

Enterprises around the globe are grappling with the transition to the cloud and what that means for networking and security practices. After years are being at odds, shared goals have brought these teams together. Aligning efforts is leading to risk reduction, cost containment, improved performance, and better security.

Join us to find out why joining forces with your networking manager may be the best thing for your security team right now.

Find out what techniques, tricks and tips Cisco researchers use to uncover and identify threats like malicious cryptomining, phishing and ransomware attacks.

Join us to learn the latest trends on top threats and best practices you can use to protect against threats in your organization. We’ll review steps you can take to improve your threat detection, prevention and remediation efforts for your organization.

Are common security pitfalls putting your network at risk? We get it. More and more users are working wherever they please — not always using the VPN. And you may not have visibility to all the apps in use across your organization. While firewalls are ok, they won’t protect users when they are off network. There’s a lot standing between you and a safe network. Your security shouldn’t be one of them. Join us for our webinar, "6 Degrees of Network Security," and learn how to avoid 6 common security pitfalls that put your users, their devices, and your data at risk.

Join John Strand and Jake Williams - SANS Senior Instructors along with John Pescatore, SANS Director of Emerging Security Trends for a discussion on your best strategies to consider for 2019 to build and maintain your cybersecurity defenses. This special 2 hour webcast includes talks from John Strand and Jake and is followed by a lively panel of all three experts. Sponsored by Cisco.

What if you could protect every user on your Meraki network in minutes without deploying an additional appliance? That’s the magic of combining the Meraki MR wireless access points and Cisco Umbrella. Cisco Umbrella is a DNS-layer security solution that blocks users from accessing malicious sites before the connection is made, proactively preventing against security breaches. With this integration, it is easier than ever to set custom policies and deploy them across your Meraki network. Join us for a live demo showcasing this new integration.

Duncan McAlynn, an industry expert, cybersecurity consultant, and a member of the FBI InfraGard

With the holidays among us, one can’t help but to think about taking some much needed time off to spend with friends and family. However, hackers don’t really do holidays. In fact, according to the FBI, the holidays bring more intense activity from hacking groups, cyber terrorists and nation states because they know we’re more vulnerable during these times.

Watch industry expert and cybersecurity consultant, Duncan McAlynn, discusses the top attack vectors being used by malicious actors today and what we can expect in the coming year. Mr. McAlynn, a member of the FBI InfraGard, will also briefly discuss the social and economic impact these attacks can have on our nation’s citizens, organizations and economy along with 5 key things that you can do right now to help protect and defend your company.

Business today happens at the branch. But where does IT work? Typically, not at the branch. So enterprises struggle to manage nontraditional users and even more connected devices across disparate branch locations.

As direct internet access increases, the risk of exposure to critical business resources rises. At the same time, application usage via multiple clouds (Office 365, G-suite, etc.) challenges the existing network architecture.

What does this add up to? Pressure for IT staff as they struggle to reduce costs, improve security measures, and application performance. Join us to learn how to gain better performance and more security effectiveness for your branch offices.

Today, IT departments are under pressure to do more with less. With limited budgets and smaller teams, the race is on to deliver more effective security without any reduction in reliability or performance. The high cost of enterprise WAN connectivity and support, combined with the growth of cloud-based services and bandwidth-hungry streaming applications, is forcing many network admins and security professionals to search for alternative solutions. With more branch offices connecting directly to the internet, how can you quickly and easily protect users on any device, anywhere they roam?

Find out how Cisco Umbrella is making it easier than ever to provide effective cloud security with centralized visibility and control. Watch to see how you can say bye bye to backhauling and hello to better branch security.

Long gone are the days when Security Professionals could protect their actual network and not have to worry about organization, employee, student or customer information being at risk. In today's always-connected world, much happens beyond the network (especially in the cloud) and the concept of perimeter security has all but evaporated.

Wherever Users are - the office, the classroom, traveling, or working from home - organizations need to enable security so Users can easily and safely to do their jobs. Users want to be able to just "connect" and work-- oblivious to the dangers out there. Moving security "behind the scenes" means needing to be more predictive about how attacks will happen and engaging early in the attack cycle. DNS-layer security is an important component piece of an overall security strategy that aims to stop attacks before they cause irreparable harm. Watch this webcast to learn more.

Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies. Not everyone has the technical wherewithal, financial resources and the massive amount of hardware to build their own cryptomine, so what options do they have? The answer is simple and as old as time: If you don’t have the resources, you “borrow” (steal?) from someone who does.

This webcast looks at how cryptomining works and how to determine if your computing resources are being used without your knowledge for cryptomining.

The healthcare sector has been significantly impacted by ransomware in the last five years. Ransomware locks down computers, encrypts files, locks users out of their systems, and may disrupt patient care and business operations. A ransom is demanded for the safe return of the data by malicious actors. But, there is no guarantee that the data will be successfully recovered.

Lee Kim, director of privacy and security for HIMSS North America shares how the ransomware threat has evolved over time, the current ransomware threat, and information on mitigating the threat. Lee will also share her predictions on what the healthcare and public health sector can expect in the future and the emergence of cryptojacking as a future threat.

As summer vacations draw to an end, and kids return to school, we’re hoping you have more time to focus on how to improve your organization’s security posture. Cisco cloud security product expert Casey Ulaky will walk you through our Back to School Cybersecurity Checklist, where you will learn how to:

- Know if you are experiencing a targeted attack.
- View unsanctioned cloud services and gain a better understanding of your internet activity across all devices, on and off the network.
- Highlight some of our new features, like iOS protection, cryptomining security category, app discovery and more!

As the industry’s first secure internet gateway, Cisco Umbrella provides the first line of defense against threats on the internet anywhere users go. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.

Cisco Cloudlock is a cloud-native CASB and cloud cybersecurity platform that helps accelerate use of the cloud, including the apps you buy and build. Cloudlock helps you to secure your identities, data, and applications in the cloud.

Join us to see how Cisco cloud security complements existing network security by providing an additional layer of protection when users connect directly to the internet and cloud services. Through a live demonstration, you'll see first-hand how our innovative approach sees threats other security solutions miss. If you or someone from your team would like to join us at an upcoming webinar session, please be sure to reserve your spot.

Speaker bio:

Meg Diaz is a member of the Cisco Umbrella (formerly OpenDNS) products team at Cisco, where she is responsible for the go-to-market strategy and execution across multiple products. Diaz has been in the security industry for more than seven years, with experience in network, endpoint, cloud, and data security. Prior to Cisco Umbrella, she worked at RSA, the Security Division of EMC in various roles. Diaz graduated with honors from Cornell University, where she majored in Applied Economics and Management and minored in Communication.